The Pains of Encryption Key Management: Why Manual Processes Are So Hard

The Pains of Encryption Key Management: Why Manual Processes Are So Hard
Scott Carter
Thu, 08/16/2018 – 18:53

In its 2018 Global Encryption Trends Study, Thales along with Venafi and Geobridge sponsored Ponemon Institute to survey 5,252 IT and securit… Continue reading The Pains of Encryption Key Management: Why Manual Processes Are So Hard

The Internet of Things: Getting Smarter about Securing Smart Technologies

The Internet of Things: Getting Smarter about Securing Smart Technologies
Scott Carter
Wed, 08/15/2018 – 19:13

Machine identities are not being secured in the same way as human identities online, resulting in a lack of encryption across networks, amon… Continue reading The Internet of Things: Getting Smarter about Securing Smart Technologies

Tales from the Black Hat NOC: Are We Broken?

Walking through the expo hall at Black Hat Europe was uplifting – if the vendor booths were to be believed, APT’s can be stopped in their tracks, Ransomware protection can be guaranteed, and phishing can become a term applied to lake activities again. All it requires is buying this tool! It made me wonder why people…

The post Tales from the Black Hat NOC: Are We Broken? appeared first on Speaking of Security – The RSA Blog.

Continue reading Tales from the Black Hat NOC: Are We Broken?

Tales from the Black Hat NOC: The Stages of Security Adolescence (Part 2)

In Part 1 of “Tales of the Black Hat NOC: The Stages of Security Adolescence,” I discussed the maturation process of the Black Hat NOC, and security strategies in general.  In the blog post below – you can see the adjustments we made and additional steps we took towards optimizing our NOC at Black Hat. …

The post Tales from the Black Hat NOC: The Stages of Security Adolescence (Part 2) appeared first on Speaking of Security – The RSA Blog and Podcast.

Continue reading Tales from the Black Hat NOC: The Stages of Security Adolescence (Part 2)

Tales from the Black Hat NOC: The Stages of Security Adolescence (Part 1)

Maturity is often spoken of in the security community as a binary value – “Customer X is mature,” “Customer Y is immature…” This notion was not dispelled at Black Hat where one vendor after another claimed, “Evolve your security. Buy our product and stop breaches today!” But we know that maturity is not binary, and neither is…

The post Tales from the Black Hat NOC: The Stages of Security Adolescence (Part 1) appeared first on Speaking of Security – The RSA Blog and Podcast.

Continue reading Tales from the Black Hat NOC: The Stages of Security Adolescence (Part 1)

Tales from the Black Hat NOC: Attendee Attacks, Loud and Proud

We are approaching the end of Black Hat‘s training days. It’s an interesting time when the expo floor still sits quiet, but the Black Hat network is as noisy as ever – as seen by the RSA volunteers working inside the Black Hat NOC. The majority of this noise is being generated by teachers and students, demonstrating…

The post Tales from the Black Hat NOC: Attendee Attacks, Loud and Proud appeared first on Speaking of Security – The RSA Blog and Podcast.

Continue reading Tales from the Black Hat NOC: Attendee Attacks, Loud and Proud

Tales from the Black Hat NOC: I’ll Show You Mine, We Can Already See Yours

With the start of Black Hat 2016 merely a day away, white, black, and grey hats from around the world are whetting their appetites – eagerly waiting to show off and consume the fruit of an entire year’s research. Whether for education, research, bragging rights, or mal-intent, the Black Hat network will host anything from basic brute force attacks to…

The post Tales from the Black Hat NOC: I’ll Show You Mine, We Can Already See Yours appeared first on Speaking of Security – The RSA Blog and Podcast.

Continue reading Tales from the Black Hat NOC: I’ll Show You Mine, We Can Already See Yours